Assessing the Differences of Clone Detection Methods Used in the Fault-Prone Module Prediction

Author(s):  
Masateru Tsunoda ◽  
Yasutaka Kamei ◽  
Atsushi Sawada
2019 ◽  
Vol 9 (16) ◽  
pp. 3283 ◽  
Author(s):  
Zhenhao Luo ◽  
Baosheng Wang ◽  
Yong Tang ◽  
Wei Xie

Code reuse is widespread in software development as well as internet of things (IoT) devices. However, code reuse introduces many problems, e.g., software plagiarism and known vulnerabilities. Solving these problems requires extensive manual reverse analysis. Fortunately, binary clone detection can help analysts mitigate manual work by matching reusable code and known parts. However, many binary clone detection methods are not robust to various compiler optimization options and different architectures. While some clone detection methods can be applied across different architectures, they rely on manual features based on human prior knowledge to generate feature vectors for assembly functions and fail to consider the internal associations between features from a semantic perspective. To address this problem, we propose and implement a prototype GeneDiff, a semantic-based representation binary clone detection approach for cross-architectures. GeneDiff utilizes a representation model based on natural language processing (NLP) to generate high-dimensional numeric vectors for each function based on the Valgrind intermediate representation (VEX) representation. This is the first work that translates assembly instructions into an intermediate representation and uses a semantic representation model to implement clone detection for cross-architectures. GeneDiff is robust to various compiler optimization options and different architectures. Compared to approaches using symbolic execution, GeneDiff is significantly more efficient and accurate. The area under the curve (AUC) of the receiver operating characteristic (ROC) of GeneDiff reaches 92.35%, which is considerably higher than the approaches that use symbolic execution. Extensive experiments indicate that GeneDiff can detect similarity with high accuracy even when the code has been compiled with different optimization options and targeted to different architectures. We also use real-world IoT firmware across different architectures as targets, therein proving the practicality of GeneDiff in being able to detect known vulnerabilities.


Author(s):  
Yan-Ya Zhang ◽  
Ming Li

Code clone is common in software development, which usually leads to software defects or copyright infringement. Researchers have paid significant attention to code clone detection, and many methods have been proposed. However, the patterns for generating the code clones do not always remain the same. In order to fool the clone detection systems, the plagiarists, known as the clone creator, usually conduct a series of tricky modifications on the code fragments to make the clone difficult to detect. The existing clone detection approaches, which neglects the dynamics of the “contest” between the plagiarist and the detectors, is doomed to be not robust to adversarial revision of the code. In this paper, we propose a novel clone detection approach, namely ACD, to mimic the adversarial process between the plagiarist and the detector, which enables us to not only build strong a clone detector but also model the behavior of the plagiarists. Such a plagiarist model may in turn help to understand the vulnerability of the current software clone detection tools. Experiments show that the learned policy of plagiarist can help us build stronger clone detector, which outperforms the existing clone detection methods.


Author(s):  
Anne F. Bushnell ◽  
Sarah Webster ◽  
Lynn S. Perlmutter

Apoptosis, or programmed cell death, is an important mechanism in development and in diverse disease states. The morphological characteristics of apoptosis were first identified using the electron microscope. Since then, DNA laddering on agarose gels was found to correlate well with apoptotic cell death in cultured cells of dissimilar origins. Recently numerous DNA nick end labeling methods have been developed in an attempt to visualize, at the light microscopic level, the apoptotic cells responsible for DNA laddering.The present studies were designed to compare various tissue processing techniques and staining methods to assess the occurrence of apoptosis in post mortem tissue from Alzheimer's diseased (AD) and control human brains by DNA nick end labeling methods. Three tissue preparation methods and two commercial DNA nick end labeling kits were evaluated: the Apoptag kit from Oncor and the Biotin-21 dUTP 3' end labeling kit from Clontech. The detection methods of the two kits differed in that the Oncor kit used digoxigenin dUTP and anti-digoxigenin-peroxidase and the Clontech used biotinylated dUTP and avidinperoxidase. Both used 3-3' diaminobenzidine (DAB) for final color development.


1988 ◽  
Vol 60 (02) ◽  
pp. 133-136 ◽  
Author(s):  
R Schneppenheim ◽  
H Plendl ◽  
U Budde

SummaryA luminescence assay was adapted for detection of von Willebrand factor multimers subsequent to SDS-agarose gel electrophoresis and electroblotting onto nitrocellulose. The method is as fast as chromogenic detection methods and appears to be as sensitive as autoradiography without the disadvantages of the latter.


2015 ◽  
Vol 14 (1) ◽  
pp. 282-288
Author(s):  
Israa Adnan Ibraheam Al-Baghdady ◽  
Ashwak Bassim Jassim ◽  
Zainab Khudher Ahmed

2008 ◽  
Vol 4 (2) ◽  
pp. 40-48 ◽  
Author(s):  
Ya.B. Blume ◽  
◽  
M.O. Bannikova ◽  
P.A. Karpov ◽  
I.K. Komarnitsky ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document